BreachFlow

See how major breaches actually unfold — step by step, as interactive attack-path replays.

Explore a ReplaySubmit a Breach
Email alerts
Get new BreachFlow replays
No newsletters. Just replay links.
Tip: publish a replay + share it — trending rises — alerts become habit.
Featured Replay
CPUID
The Trojanized Downloads
Unknown threat actors compromised CPUID's website for less than 24 hours, replacing legitimate CPU-Z and HWMonitor download links with malicious ones. This led to the distribution of trojanized software leveraging DLL side-loading to deploy the STX RAT, an infostealer with HVNC capabilities.
score 10

Trending this week

Based on views + shares + card downloads

Trending entry paths (7 days)

Most common Initial Access patterns
Technique
Valid AccountsT1078
3 incidents
Technique
Compromise InfrastructureT1584
1 incident
Technique
Compromise Software Supply ChainT1195.002
1 incident

All replays

Year:
Attack:
KrakenNEW2026Valid Accounts
Insider's Digital Betrayal
A cybercrime group attempted to extort Kraken after recruiting at least two internal support employees to improperly access limited client support data from approximately 2,000 accounts. The threat actors threatened to release videos of internal systems showing client data.
McGraw-HillNEW2026Exploit Public-Facing Application
Salesforce Shadow Breach
Education company McGraw-Hill confirmed a data breach after hackers exploited a Salesforce misconfiguration on a hosted webpage, leading to unauthorized access to internal data. The ShinyHunters extortion group claimed responsibility, threatening to leak 45 million Salesforce records containing PII, a claim McGraw-Hill disputes regarding sensitivity and volume.
Basic-FitNEW2026Valid Accounts
The Fitness Data Heist
Hackers breached Basic-Fit's systems, gaining unauthorized access and exfiltrating personal data for approximately 1 million members across Europe. The compromised data included full names, addresses, email addresses, phone numbers, dates of birth, bank account details, and other membership information.
Booking.comNEW2026Valid Accounts
Booking's Reservation Exposure
Booking.com confirmed that unauthorized third parties accessed user booking information, including full names, email addresses, postal addresses, phone numbers, and communications. The company responded by forcing PIN resets for affected reservations and notifying users.
Rockstar GamesNEW2026Compromise Software Supply Chain
Analytics Data Heist
The ShinyHunters extortion gang leaked over 78.6 million Rockstar Games analytics records, including in-game revenue, player behavior, and customer support data. The data was stolen from Snowflake environments using authentication tokens compromised during a security incident at Anodot, a third-party SaaS integrator.
CPUIDNEW2026Compromise Infrastructure
The Trojanized Downloads
Unknown threat actors compromised CPUID's website for less than 24 hours, replacing legitimate CPU-Z and HWMonitor download links with malicious ones. This led to the distribution of trojanized software leveraging DLL side-loading to deploy the STX RAT, an infostealer with HVNC capabilities.
Hims & Hers Health2026Compromise of Third-Party Software, Data, or Services
The Telehealth Trust Breach
Telehealth company Hims & Hers Health suffered a data breach via its third-party customer support platform, exposing sensitive personal health information (PHI) including names, email addresses, and medical details from customer support tickets. The ShinyHunters group claimed responsibility for the attack, though these claims were unverified.
Microsoft2026Search Engine Optimization Poisoning
Payroll Pirate Plunder
Financially motivated threat actor Storm-2755 targeted Canadian employees of Microsoft using malicious Microsoft 365 sign-in pages to steal authentication tokens and session cookies. This enabled them to bypass MFA and hijack salary payments by manipulating direct deposit information in HR platforms like Workday.
TermsContact